CISSP Final

CISSP Final

Assessment

Quiz

•

Computers

•

Professional Development

•

Practice Problem

•

Hard

Created by

Brian OHare

Used 1+ times

FREE Resource

Student preview

quiz-placeholder

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Physical assets defined in an organization's business impact analysis (BIA) could include which of the following?

Personal belongings of organizational staff members

Disaster recovery (DR) line-item revenues

Cloud-based applications

Supplies kept off-site a remote facility

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When assessing the audit capability of an application, which of the following activities is MOST important?

Identify procedures to investigate suspicious activity.

Determine if audit records contain sufficient information.

Verify if sufficient storage is allocated for audit records.

Review security plan for actions to be taken in the event of audit failure.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An organization would like to implement an authorization mechanism that would simplify the assignment of various system access permissions for many users with similar job responsibilities. Which type of authorization mechanism would be the BEST choice for the organization to implement?

Role-based access control (RBAC)

Discretionary access control (DAC)

Mandatory access control (MAC)

Attribute-based access control (ABAC)

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of access control is abbreviated as RBAC?

Role-based access control

Discretionary access control

Content-dependent Access Control

Rule-based Access Control

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the PRIMARY reason for criminal law being difficult to enforce when dealing with cybercrime?

Jurisdiction is hard to define.

Law enforcement agencies are understaffed.

Extradition treaties are rarely enforced.

Numerous language barriers exist.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Wi-Fi Protected Access 2 (WPA2) provides users with a higher level of assurance that their data will remain protected by using which protocol?

Extensible Authentication Protocol (EAP)

Internet Protocol Security (IPsec)

Secure Sockets Layer (SSL)

Secure Shell (SSH)

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which part of an operating system (OS) is responsible for providing security interfaces among the hardware, OS, and other parts of the computing system?

Reference monitor

Trusted Computing Base (TCB)

Time separation

Security kernel

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?